WE OFFER ULTRA
LIGHTWEIGHT & POST QUANTUM STRONG
TECHNOLOGIES THAT ADDRESS CYBERSECURITY GAPS
Secure Channels offers future-proof, high performance, secure crypto technologies that address cybersecurity gaps.
OUR TECHNOLOGIES
We design ultra-efficient & secure encryption tools and platforms that offer software developers, hardware manufacturers, and enterprise organizations more ways to leverage encryption.
EASY TO USE AND IMPROVED PERFORMANCE
Tools that are easy to use and improve performance will get used & integrated more often to protect more data, further minimizing the risk from data theft.
# Protect More Data
# Minimize Data Theft Risk
SIGNIFICANTLY MITIGATE COST
OF BREACH ($8.1M)
“Extensively using encryption” has been proven to provide the highest R.O.I. a company can make in its cybersecurity framework. Companies using our platforms and tools could significantly mitigate the $3.9 to $8.1M average cost of a breach and possibly avoid breach disclosure altogether.
# Significantly mitigate cost
# Avoid breach disclosure
ULTRA LIGHTWEIGHT & POST QUANTUM STRONG
Our encryption is a category leader in overall speed, software efficiency, Quantum-Safe strength, and integration flexibility - making it perfectly suited for securing a wide variety of data-in-transit and data-at-rest use cases
# Ultra-lightweight
# Post-Quantum strong
CRYPTOGRAPHICALLY ADDRESSING CYBERSECURITY GAPS WITH SECURE CHANNELS' ENCRYPTION TECHNOLOGIES

QUANTUM RESILIENT CRYPTOGRAPHY
SDK/API in Java and C++
# Quantum-resistant encryption designed to withstand present and emerging threats
# Lightweight code integrates easily into resource-constrained technologies
# Block cipher strength with streaming cipher speed for data at rest and in transit
# Efficient encryption without strength-for-performance tradeoff
# Future-ready protection supplies data privacy control compliance
ENCRYPTION
WHAT IS XOTIC®
XOTIC® is a “Hybrid” cryptosystem comprised of known cryptographic building blocks
Flexible & ultra lightweight
Not susceptible to standard Brute-Force attacks as queries always produce a positive response
Can be coded to work in various applications

Can be embedded into devices where traditional encryption would be
Encryption strength can be fixed or modulated between DIAL-1 (512-bit) to DIAL-9 (131,126-bit) settings
Packaged with CSPRNG or QRNG to protect against upcoming advances in Quantum computing
Commercially available in DIAL-1 (512-bit) to DIAL-4 (4096-bit)
XOTIC® & YOUR BUSINESS
XOTIC® Cryptosystem encryption is stronger, faster, and lighter-weight than existing standardized encryption algorithms. Crypto-agile cryptosystem allows users the choice between native XOTIC® or FIPS-Compliant XOTIC® encryption.
XOTIC® CAN BE PROVIDED AS
OEM-LICENSABLE COMPONENT · INTEGRATION · SOLVING FOR IoT, IIoT/ICS FOR CRITICAL INFRASTRUCTURE ·
LEGACY DEVICES & SYSTEMS · STREAMING MEDIA INCLUDING CCTV · 5G
XOTIC® WHITE PAPERS & RESOURCES

SAFE, SECURE DISTRIBUTED KEY EXCHANGE
# High-Speed Secret Key Sharing
# Adaptable & Secure
# Global scalability
# Open, Semi-Open, Closed Networks, RF
# Does not rely on PKI, Certs, RSA or asymmetric encryption
KEY EXCHANGE
WHAT IS SKI™
SECURE KEY INFRASTRUCTURE
Safe & secure distributed key exchange
True,
double-blinded token exchange
(key distribution)
Utilizes worldwide satellite network infrastructure

Uses OAuth, HTTPS, and TLS
SKI’s native Token Authority (TA) is SCIFCOM
Secure communications between clients and servers during Token Exchange process
SKI™ & YOUR BUSINESS
The Secure Key Infrastructure:
# Leverages a global provider satellite network
# Eliminates the cumbersome/ insecure PKI Certificate Authority process
# Can be licensed and deployed by OEM’s to replace PKI
SKI™ CAN BE PROVIDED AS
OEM-LICENSABLE COMPONENT · INTEGRATION · SOLVING FOR IoT, IIoT/ICS FOR CRITICAL INFRASTRUCTURE ·
LEGACY DEVICES & SYSTEMS · STREAMING MEDIA INCLUDING CCTV · 5G
SKI™ WHITE PAPERS & RESOURCES
XOTIC® & SKI™ WHITE PAPERS & RESOURCES

QUANTUM RESILIENT ENCRYPTION
# Future-ready cybersecurity behind layers of encryption
# Innate fallback security if any ciphers compromised
# Resistance to multiple cyberattacks
# Assimilation of new quantum-resilient ciphers
# Encryption suited for regulated environments
ENCRYPTION
WHAT IS PKMS2®
FUTURE-READY QUANTUM RESILIENT ENCRYPTION
Using an easily deployable mode of operation
Starting strength is 387-bit, mitigates against brute force & side channel attacks
Combines and hardens from 2 to 8 existing, known, symmetric
algorithms

Encryption strength increases from 387-bit to 512-bit
Choice of 2 to 8 trusted algorithms, including (AES)
Can incorporate new (Quantum-resilient) ciphers currently being evaluated as they become available
PKMS2® & YOUR BUSINESS
# Patented method for combining encryption algorithms
# Swappable API replacement for (AES) library
# Fully compliant for any industry and platform agnostic integration
# Increased side-channel attack resistance
# Fall-back security should one algorithm get broken
# Provides cryptographic agility in being able to incorporate new quantum-resistant algorithms as they becomes available